Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

I was requested to create a office with 2 0 pc , 3 printers. I need help in setting an office environment with modem, switchs,

I was requested to create a office with 20 pc,3 printers. I need help in setting an office environment with modem, switchs, servers etc. Need help with network diagram and also answers to below :
Security Measures
Outline the security measures implemented to protect the network from cyber threats, including encryption protocols, access controls, and monitoring systems.
Instructions for Filling the Table:
1. Security Measure: Specify the type of security measure (e.g., Encryption Protocols, Access Controls, Monitoring Systems, Physical Security Measures).
2. Description of Implementation: Provide a detailed description of how each security measure was implemented.
3. Justification: Explain why each security measure was chosen and how it enhances the network's security.
4. Devices Involved: List the devices that are involved in or affected by the security measure.
5. Notes: Include any additional notes or comments about the security measure.
Describe the strategies used to optimise network performance, such as bandwidth management, firmware updates, and driver installations.
Instructions for Filling the Table:
1. Optimisation Strategy: Specify the optimisation strategy used (e.g., Bandwidth Management, Firmware Updates, Driver Installations).
2. Description of Implementation: Provide a detailed description of how the strategy was implemented.
3. Devices Involved: List the devices involved in the optimisation strategy.
4. Expected Outcome: Describe the expected outcome or benefit of implementing the strategy.
5. Notes: Include any additional notes or comments about the optimisation strategy.Device Configuration
Provide a description of the configuration settings for each network device, including routers, switches, servers, and end-user devices. Include information on security protocols, IP addressing schemes, and any special configurations.
Instructions for Filling the Table:
1. Device Type: Specify the type of device (e.g., Router, Switch, Server, Workstation, Wireless Router, IDS/IPS, Firewall, VPN Gateway).
2. Device Name: Provide a unique name for each device in the network.
3. IP Address: Enter the IP address assigned to the device. Use DHCP if the device is configured to receive its IP address dynamically.
4. Subnet Mask: Enter the subnet mask for the devices network segment.
5. Default Gateway: Specify the default gateway IP address for the device, typically the IP address of the router.
6. Security Protocols: List any security protocols configured on the device (e.g., WPA2, SSL/TLS, ACLs, IPsec).
7. Special Configurations: Describe any special configurations for the device, such as DHCP settings, VLAN setup, NAT, or specific application setups.
8. Notes: Include any additional notes or comments about the devices role or configuration within the network.
Evaluation
Evaluate the effectiveness of the network design and implementation, considering factors such as reliability, scalability, and adherence to project objectives.
Instructions for Filling the Table:
1. Evaluation Aspect: Specify the aspect of evaluation (e.g., Reliability, Scalability, Adherence to Project Objectives).
2. Description of Assessment: Provide a detailed assessment of each aspect.
3. Measures Taken: Describe the measures taken to achieve reliability, scalability, and adherence to objectives.
4. Justification: Explain why these measures were chosen and how they contribute to the effectiveness of the network.
5. Notes: Include any additional notes or comments about the evaluation aspect.
Reflection
Reflect on the process of designing and implementing the network, discussing challenges faced, lessons learned, and areas for improvement.
Reflect on the social, ethical, and legal implications of your network design on individuals, society, and the environment.
Instructions for Filling the Table:
1. Reflection Aspect: Specify the aspect of reflection (e.g., Challenges Faced, Lessons Learned, Areas for Improvement, social, legal and ethical implications).
2. Description: Provide a detailed description of each aspect.
3. Example: Offer specific examples that illustrate the reflection aspect.
4. Notes: Include any additional notes or comments.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

DB2 11 The Ultimate Database For Cloud Analytics And Mobile

Authors: John Campbell, Chris Crone, Gareth Jones, Surekha Parekh, Jay Yothers

1st Edition

ISBN: 1583474013, 978-1583474013

More Books

Students also viewed these Databases questions